Security Protocols I - Information Security
Security Protocols I - Information Security
Security Protocols I - Information Security
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Sebastian Mödersheim 1. A, B12Building a key establishment protocol (6)• Problem with this protocol?AS2. K AB 3. K AB , AThe session key K AB must be transported to A and B but to noother parties.• A realistic assumption in typical communication systems such asthe Internet and corporate networks:<strong>Security</strong> Assumption 1: the intruder is able to eavesdrop onall messages sent in a security protocol.⇒ Use a cryptographic algorithm and associated keys. BFMSEC Module 2, v.2 28.09.2009